Please sign in before continuing.

H04M15/882

Systems and methods for reducing wireless network congestion
11071042 · 2021-07-20 · ·

A computer-implemented method for reducing wireless network congestion comprising receiving an initial request for network access from a mobile device and transmitting a request to a PCRF. The method includes receiving, from the PCRF, a rejection message denying access to data, and denying the initial request for network access based on the rejection message. The method includes, in response to receiving the rejection message, storing information identifying the mobile device and the user associated with the initial request. The method includes receiving a subsequent request for network access, and scanning the memory to determine that identifying information associated with the subsequent request for network access matches the stored information associated with the initial request for network access. Based on the matching stored information associated with the initial and subsequent requests for network access, the method includes denying the subsequent request for network access.

SYSTEMS AND METHODS FOR REDUCING WIRELESS NETWORK CONGESTION
20210306933 · 2021-09-30 ·

A method for reducing wireless network congestion including receiving an initial request for network access from a mobile device and determining a customer support time period associated with an initial location. In response to receiving the initial request for network access, the method includes transmitting a request to a network node and receiving, from the network node, a rejection message denying access to the network. The method includes denying the initial request based on the rejection message. The method includes receiving a subsequent request for network access that includes a subsequent location. The method includes determining that identifying information associated with the subsequent request matches identifying information associated with the initial request. The method includes denying the subsequent request when the subsequent location is the same as the initial location and a request time of the subsequent request is outside the customer support time period.

ACHIEVING SEAMLESS SERVICE DURING UNREACHABILITY OF CHARGING FUNCTION ENTITY
20210194709 · 2021-06-24 ·

In one example, a session management function entity is configured to obtain an indication of a backup resource usage quota associated with a rating group of a user session for a user equipment configured to communicate via a mobile core network. The rating group is subject to online charging. The session management function entity determines that a charging function entity configured to provide an indication of a primary resource usage quota associated with the rating group is unreachable. In response to determining that the charging function entity is unreachable, the session management function entity allocates the backup resource usage quota associated with the rating group while the charging function entity is unreachable.

QUALITY OF SERVICE FOR A VIDEO STREAMING SERVICE

Methods and apparatus for managing quality of service for video streaming, in which a Policy and Charging Rules Function (PCRF) in a Policy Charging Control (PCC) architecture of a telecommunications system receives from a Policy Control Enforcement Function (PCEF) a notification indicating that a video service has started for streaming video content to a user equipment (UE). A first Quality of Service (QoS) setting for streaming the video service to the UE is determined. First QoS setting data identifying the first QoS setting is transmitted to the PCEF. The PCEF transmits a further notification to the PCRF indicating that a particular stage has been reached. The PCRF receives the notification from the PCEF. In response to the further notification, a second QoS setting specifying a lower QoS than the first QoS setting for streaming the video service after the particular stage is determined. The PCRF identifies the second QoS setting to the PCEF.

Network access control
11032277 · 2021-06-08 · ·

A network access control method includes obtaining network information of an electronic device, determining, using the network information, whether the electronic device needs to use a first access point name (APN) network channel, and generating a network channel switching instruction in response to determining that the electronic device needs to use the first APN network channel. The network channel switching instruction instructs to switch the electronic device from a second APN network channel to the first APN network channel. The second APN network channel has access to more network resource addresses than the first APN network channel.

Dynamic adaptation of maximum packet loss rate (PLR) for single radio voice call continuity (SRVCC) handover optimization using session description protocol (SDP)
11026147 · 2021-06-01 · ·

User equipment (UE) includes processing circuitry, where to configure the UE for Single Radio Voice Call Continuity (SRVCC) handover from an LTE network to a legacy network with circuit switched (CS) communications, the processing circuitry is to encode a Session Description Protocol (SDP) message for transmission to a second UE within the LTE network. The SDP message includes a voice codec selection for voice over LTE communication with the second UE and a maximum end-to-end packet loss rate (E2E_MAX_PLR) that can be tolerated by the UE when using the voice codec. The UE decodes an SRVCC handover command from an eNB within the LTE network, the handover command based on at least one packet loss rate (PLR) associated with a packet switched voice communication link between the UE and the second UE exceeding a PLR threshold that is determined based on the E2E_MAX_PLR that can be tolerated by the UE.

SYSTEMS AND METHODS FOR REDUCING WIRELESS NETWORK CONGESTION
20210153101 · 2021-05-20 ·

A computer-implemented method for reducing wireless network congestion comprising receiving an initial request for network access from a mobile device and transmitting a request to a PCRF. The method includes receiving, from the PCRF, a rejection message denying access to data, and denying the initial request for network access based on the rejection message. The method includes, in response to receiving the rejection message, storing information identifying the mobile device and the user associated with the initial request. The method includes receiving a subsequent request for network access, and scanning the memory to determine that identifying information associated with the subsequent request for network access matches the stored information associated with the initial request for network access. Based on the matching stored information associated with the initial and subsequent requests for network access, the method includes denying the subsequent request for network access.

Device and process for data throttling for wireless device

The disclosure provides a system and method for controlling on a wireless device the amount and speed of data transferred between a wireless device and the Internet, and a wireless device with a metering client that can throttle data speeds and types based on how much data a user has used. Specifically, the wireless device includes a metering client to track one of data usage or an amount of prepaid data available. When the metering client determines that the amount of data available has exceeded a pre-determined threshold, the wireless device inhibits further data transmission amounts and speeds.

OFFLINE CHARGING OF COMMUNICATIONS SERVICES
20210105364 · 2021-04-08 ·

The disclosed embodiments include a method for offline charging performed by an anchoring node of a telecommunications network. The anchoring node can send a request to an online charging system (OCS), where the request is for online metering of a call by a subscriber of the telecommunications network. The anchoring node may obtain an indication of an exception to the online metering of the call. In response, the anchoring node can perform a default call handling (DCH) procedure to allow the call on the telecommunications network despite an inability to perform the online metering. The anchoring node also generates a modified charging detail record (CDR) that includes an indication of the exception. The anchoring node can then send a message, which includes at least an indication of the modified CDR, to enable a mediation server to perform offline charging for the call.

SECURE TOKENS FOR CONTROLLING ACCESS TO A RESOURCE IN A RESOURCE DISTRIBUTION NETWORK
20210118068 · 2021-04-22 ·

A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a time-based token based on a time duration specified for a meter. The time-based token indicates the time duration for the meter. The time-based token is further generated based on an identifier of the meter. The headend system transmits the time-based token to the meter via at least a mesh network. After receiving the time-based token, the meter validates the time-based token to determine that the time-based token is generated for the meter based on information related to the identifier of the meter. If the meter determines that the time-based token is valid, the meter connects premises associated with the meter to a resource distribution network for at least the time duration specified in the time-based token.